Works about COMPUTER network security


Results: 5000
    1
    2
    3
    4
    5
    6
    7
    8

    Report on Pairing-based Cryptography.

    Published in:
    Journal of Research of the National Institute of Standards & Technology, 2015, v. 120, p. 11, doi. 10.6028/jres.120.002
    By:
    • Moody, Dustin;
    • Peralta, Rene;
    • Perlner, Ray;
    • Regenscheid, Andrew;
    • Roginsky, Allen;
    • Chen, Lily
    Publication type:
    Article
    9
    10

    Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review.

    Published in:
    International Journal of Information Technology & Decision Making, 2023, v. 22, n. 1, p. 589, doi. 10.1142/S021962202230004X
    By:
    • Alamleh, Amneh;
    • Albahri, O. S.;
    • Zaidan, A. A.;
    • Alamoodi, A. H.;
    • Albahri, A. S.;
    • Zaidan, B. B.;
    • Qahtan, Sarah;
    • binti Ismail, Amelia Ritahani;
    • Malik, R. Q.;
    • Baqer, M. J.;
    • Jasim, Ali Najm;
    • Al-Samarraay, Mohammed S.
    Publication type:
    Article
    11
    12
    13
    14
    15
    16
    17
    18

    Analysis of Campus Network Security.

    Published in:
    Journal of New Media, 2022, v. 4, n. 4, p. 219, doi. 10.32604/jnm.2022.034830
    By:
    • Han Chu;
    • Haoliang Lan;
    • Jie Xu;
    • Xiao Feng Sun
    Publication type:
    Article
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29

    HUB PARAMETERS OF HYPERGRAPH.

    Published in:
    Journal of the Indonesian Mathematical Society, 2024, v. 30, n. 1, p. 100
    By:
    • MYITHILI, K. K.;
    • NANDHINI, C.
    Publication type:
    Article
    30
    31
    32
    33
    34
    35
    36

    Editors Corner.

    Published in:
    ISSA Journal, 2025, v. 23, n. 2, p. 5
    By:
    • Freund, Jack
    Publication type:
    Article
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47

    Encryption Standards.

    Published in:
    ISSA Journal, 2017, v. 15, n. 7, p. 14
    By:
    • Martin, Luther
    Publication type:
    Article
    48
    49
    50